International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 169

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014


SPOC for M-Healthcare using ABE

Latha PH | Asha N [4]


Abstract: The design and implementation of Personal Health Records (PHR) and providing security to them while they are stored at third party such as cloud is proposed. Personal Health Record is web based application that allows people to access and co-ordinate their lifelong health information. The patients have control over access to their own PHR. To achieve security of personal health records we use the attribute based encryption to encrypt the data before outsourcing it. A secure and privacy-preserving opportunistic computing framework; called SPOC (secure privacy and opportunistic communication) ; for m-Healthcare emergency smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific; to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency; allows a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. The SPOCs effectiveness in term of providing high reliable PHI process and transmission while minimizing the privacy disclosure during m-Healthcare emergency. To achieve fine-grained and scalable data access control for PHRs; attribute based encryption (ABE) technique s used to encrypt each patients PHI.


Keywords: Healthcare, Computing, Privacy Preserving, Mobile-Healthcare, personal health records, Attribute Based Encryption, Public domain, Private domain


Edition: Volume 3 Issue 6, June 2014,


Pages: 2162 - 2165


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top